Technology acceptance as an influencing factor of hospital employees’ compliance with data‐protection standards in Germany
暂无分享,去创建一个
Michael Foth | M. Foth | C. Schusterschitz | M. Flatscher‐Thöni | Claudia Schusterschitz | Magdalena Flatscher‐Thöni
[1] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[2] I. Ajzen,et al. Prediction of goal directed behaviour: Attitudes, intentions and perceived behavioural control , 1986 .
[3] Icek Ajzen,et al. Attitudes, personality, and behavior / Icek Ajzen , 1988 .
[4] Klaus Pommerening. Datenschutz in Krankenhausinformationssystemen , 1995, VIS.
[5] P. Ellen,et al. The Role of Perceived Consumer Effectiveness in Motivating Environmentally Conscious Behaviors , 1991 .
[6] Irene M. Y. Woon,et al. Forthcoming: Journal of Information Privacy and Security , 2022 .
[7] I. Ajzen. The theory of planned behavior , 1991 .
[8] Jacqueline J. Kacen,et al. The Influence of Culture on Consumer Impulsive Buying Behavior , 2002 .
[9] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[10] R. W. Rogers,et al. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change , 1983 .
[11] Charles D. Barrett. Understanding Attitudes and Predicting Social Behavior , 1980 .
[12] Jeffrey M. Stanton,et al. Examining employee compliance with organizational surveillance and monitoring , 2006 .
[13] Detmar W. Straub,et al. Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..
[14] Qing Hu,et al. The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..
[15] I. Ajzen. Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. , 2002 .
[16] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[17] Thomas Würtenberger. Die Akzeptanz von Gesetzen , 1999 .
[18] Youngjin Yoo,et al. It's all about attitude: revisiting the technology acceptance model , 2004, Decis. Support Syst..
[19] Leo R. Vijayasarathy,et al. Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model , 2004, Inf. Manag..
[20] Fred D. Davis,et al. A Model of the Antecedents of Perceived Ease of Use: Development and Test† , 1996 .
[21] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[22] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[23] Paul A. Pavlou,et al. Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..
[24] Klaus-Helmut Schmidt,et al. Psychometrische Eigenschaften und Validität einer deutschen Fassung des "Commitment"-Fragebogens von Allen und Meyer (1990). , 1998 .
[25] Detmar W. Straub,et al. Testing the technology acceptance model across cultures: A three country study , 1997, Inf. Manag..
[26] Cynthia K. Riemenschneider,et al. Understanding it adoption decisions in small business: integrating current theories , 2003, Inf. Manag..
[27] Detmar W. Straub,et al. The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption , 2000, J. Assoc. Inf. Syst..
[28] Pascale G. Quester,et al. Who's afraid of that ad? Applying segmentation to the protection motivation model , 2004 .
[29] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[30] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[31] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[32] Dennis F. Galletta,et al. Extending the technology acceptance model to account for social influence: theoretical bases and empirical validation , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[33] Burcu Bulgurcu,et al. The antecedents of information security policy compliance , 2008 .
[34] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[35] Qing Hu,et al. User behaviour towards protective information technologies: the role of national cultural differences , 2009, Inf. Syst. J..
[36] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[37] Kieran Mathieson,et al. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..
[38] A. B. Zakour,et al. Cultural Differences and Information Technology Acceptance , 2004 .
[39] Daniel Robey,et al. User Attitudes and Management Information System Use , 1979 .
[40] Stuart A. Youngblood,et al. Bad apples in bad barrels: A causal analysis of ethical decision-making behavior. , 1990 .
[41] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[42] John P. Meyer,et al. The measurement and antecedents of affective, continuance and normative commitment to the organization , 1990 .
[43] Paul A. Pavlou,et al. What Drives Electronic Commerce across Cultures? Across-Cultural Empirical Investigation of the Theory of Planned Behavior , 2002, J. Electron. Commer. Res..
[44] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[45] A. Bandura. Social learning theory , 1977 .
[46] Stephen Sutton,et al. Cambridge Handbook of Psychology, Health and Medicine: Theory of planned behaviour , 2007 .
[47] John Ingham,et al. Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..